cloud-based multi-tenancy computing systems and methods for providing response control and analytics are disclosed. An exemplary method includes capturing a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event; generating a first set of analytics based on the captured first set of data; capturing a second set of data based on activities that occur in a plurality of response centers of client tenants related to the clients' actions taken in response to the events that occurred to them;
generating a second set of analytics based on the captured second set of data; and based on the first and second set of analytics produced by the response system, generating and transmitting an updated menu of suggested actions for responding to a future event, to one or more of the clients.
|
1. A computer-implemented method for providing response control and analytics, comprising:
receiving, via a cloud network, data from a template of a stakeholder, the stakeholder represented as a stakeholder tenant provisioned by a response system;
receiving, by a processor of the response system, via the cloud network, the stakeholder's request for a provisioning of a client tenant for a client;
providing a response center to the client by the response system, to be displayed on the client's computing device, the response center provided on a graphical user interface, the response center implementing the template, the graphical user interface comprising a menu of actions for the client to perform in response to an event;
receiving a plurality of client preferences regarding the response center, the client preferences including client analytics and feedback, based on at least one of the client's responses to past events and the client's insights of what actions are needed to respond to the event;
based on one or more of the plurality of client preferences, customizing the response center, the customized response center initially placed in a standby mode, the standby mode indicating that the client is not currently responding to the event;
upon receiving client input through the graphical user interface, activating the customized response center when the event has occurred;
providing a notification to the stakeholder from the client when the customized response center is activated by the client;
automatically re-populating the menu of the graphical user interface of the activated response center with suggested actions for the client to perform in response to the event, the suggested actions selected from least one of the template of the stakeholder and the client's preferences;
capturing a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event;
generating a first set of analytics based on the captured first set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of a single client tenant;
capturing a second set of data based on activities that occur in a plurality of response centers of client tenants related to clients' actions taken in response to the events that occurred to them;
generating a second set of analytics based on the captured second set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of the plurality of client tenants; and
based on the first and the second set of analytics produced by the response system, generating and transmitting an updated menu of suggested actions for responding to a future event, to one or more of the clients.
10. A computer-implemented system for providing response control and analytics, comprising:
a cloud network;
a service provider for providing services via the cloud network to a response system; and
the response system configured to:
receive, via the cloud network, data from a template of a stakeholder, the stakeholder represented as a stakeholder tenant provisioned by the response system;
receive, by a processor of the response system, via the cloud network, the stakeholder's request for a provisioning of a client tenant for a client;
provide a response center to the client, to be displayed on the client's computing device, the response center provided on a graphical user interface, the response center implementing the template, the graphical user interface comprising a menu of actions for the client to perform in response to an event;
receive a plurality of client preferences regarding the response center, the client preferences including client analytics and feedback, based on at least one of the client's responses to past events and the client's insights of what actions are needed to respond to the event;
based on one or more of the plurality of client preferences, customize the response center, the customized response center initially placed in a standby mode, the standby mode indicating that the client is not currently responding to the event;
upon receiving client input through the graphical user interface, activate the customized response center when the event has occurred;
provide a notification from the client to the stakeholder when the customized response center is activated by the client;
automatically re-populate the menu of the graphical user interface of the activated response center with suggested actions for the client to perform in response to the event, the suggested actions selected from least one of the template of the stakeholder and the client's preferences;
capture a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event;
generate a first set of analytics based on the captured first set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of a single client tenant;
capture a second set of data based on activities that occur in a plurality of response centers of client tenants related to clients' actions taken in response to the events that occurred to them;
generate a second set of analytics based on the captured second set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of the plurality of client tenants; and
based on the first and the second set of analytics produced by the response system, generate and transmit an updated menu of suggested actions for responding to a future event, to one or more of the clients.
19. A computer-implemented system for providing response control and analytics, comprising:
means for receiving, via a cloud network, data from a template of a stakeholder, the stakeholder represented as a stakeholder tenant provisioned by a response system;
means for receiving, by a processor of the response system, via the cloud network, a stakeholder's request for a provisioning of a client tenant for a client;
means for providing a response center to the client by the response system, to be displayed on a client's computing device, the response center provided on a graphical user interface, the response center implementing the template, the graphical user interface comprising a menu of actions for the client to perform in response to an event;
means for receiving a plurality of client preferences regarding the response center, the client preferences including client analytics and feedback, based on at least one of the client's responses to past events and the client's insights of what actions are needed to respond to the event;
based on one or more of the plurality of client preferences, means for customizing the response center, the customized response center initially placed in a standby mode, the standby mode indicating that the client is not currently responding to the event;
upon receiving client input through the graphical user interface, means for activating the customized response center when the event has occurred;
means for providing a notification from the client to the stakeholder when the customized response center is activated by the client;
means for automatically re-populating the menu of the graphical user interface of the activated response center with suggested actions for the client to perform in response to the event, the suggested actions selected from least one of the template of the stakeholder and the client's preferences;
means for capturing a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event;
means for generating a first set of analytics based on the captured first set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of a single client tenant;
means for capturing a second set of data based on activities that occur in a plurality of response centers of client tenants related to clients' actions taken in response to the events that occurred to them;
means for generating a second set of analytics based on the captured second set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of the plurality of client tenants; and
based on the first and the second set of analytics produced by the response system, means for generating and transmitting an updated menu of suggested actions for responding to a future event, to one or more of the clients.
2. The method of
capturing a third set of data based on global activities that are determined and derived from external sources of information, regarding external businesses or organizations and their responses to events that occurred to them;
storing the third set of data in a global database of the response system; and
based on the first set, the second set and a third set of analytics produced by the response system, generating and transmitting an updated menu of suggested actions for responding to a future event to the one or more of the clients.
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
11. The system of
capture a third set of data based on global activities that are determined and derived from external sources of information, regarding external businesses or organizations and their responses to events that occurred to them;
store the third set of data in a global database of the response system; and
based on the first set, the second set and a third set of analytics produced by the response system, generate and transmit an updated menu of suggested actions for responding to a future event to the one or more of the clients.
12. The system of
13. The system of
14. The system of
15. The system of
16. The system of
17. The system of
18. The system of
20. The system of
means for capturing a third set of data based on global activities that are determined and derived from external sources of information, regarding external businesses or organizations and their responses to events that occurred to them;
means for storing the third set of data in a global database of the response system; and
based on the first set, the second set and a third set of analytics produced by the response system, means for generating and transmitting an updated menu of suggested actions for responding to a future event to the one or more of the clients.
|
N/A
The present disclosure relates generally to response control and analytics and, more specifically, to cloud-based multi-tenancy computing systems and methods for providing response control and analytics in order to address events, including but not limited to, cyber events, cyber threats, data breaches, business disruption or interruption events, any event that is atypical for a business which requires a response, and catastrophic disasters.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Provided are methods and systems for providing response control and analytics. In general, the disclosed methods and systems are directed to addressing events, including but not limited to cyber events, ransomware, and the like.
According to one example embodiment of the disclosure, systems and methods for providing response control and analytics are disclosed. An exemplary computer-implemented method for providing response control and analytics comprises receiving, via a cloud network, data from a best practices template of a stakeholder, the stakeholder represented as a stakeholder tenant provisioned by a response system; receiving, by a processor of the response system, via the cloud network, a stakeholder's request for a provisioning of a client tenant for a client; receiving a user verification of the client from a service provider via the cloud network, the user verification including a security token that is received by a processor of the response system; providing a response center to the client by the response system, to be displayed on a client's computing device, the response center provided on a graphical user interface, the response center implementing the best practices template, the graphical user interface comprising a menu of actions for the client to perform in response to an event; receiving a plurality of client preferences regarding the response center, the client preferences include client analytics and feedback, based on at least one of the client's responses to past events and the client's insights of what actions are needed to respond to the event; based on one or more of the plurality of client preferences, customizing the response center room, the customized response center initially placed in a standby mode, the standby mode indicating that the client is not currently responding to an event; upon receiving client input through the graphical user interface, activating the customized response center when an event has occurred; providing a notification to the stakeholder when the customized response center is activated by the client; automatically re-populating the menu of the graphical user interface of the activated response center with suggested actions for the client to perform in response to the event, the suggested actions selected from least one of the best practices template of the stakeholder and the client's preferences; capturing a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event; generating a first set of analytics based on the captured first set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of a single client tenant; capturing a second set of data based on activities that occur in a plurality of response centers s of client tenants related to the clients' actions taken in response to the events that occurred to them; generating a second set of analytics based on the captured second set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of the plurality of client tenants; and based on the first and second set of analytics produced by the response system, generating and transmitting an updated menu of suggested actions for responding to a future event, to one or more of the clients.
An exemplary computer-implemented system for providing response control and analytics comprises means for receiving, via a cloud network, data from a best practices template of a stakeholder, the stakeholder represented as a stakeholder tenant provisioned by a response system; means for receiving, by a processor of the response system, via the cloud network, a stakeholder's request for a provisioning of a client tenant for a client; receiving a user verification of the client from a service provider via the cloud network, the user verification including a security token that is received by a processor of the response system; means for providing a response center to the client by the response system, to be displayed on a client's computing device, the response center provided on a graphical user interface, the response center implementing the best practices template, the graphical user interface comprising a menu of actions for the client to perform in response to an event; receiving a plurality of client preferences regarding the response center, the client preferences include client analytics and feedback, based on at least one of the client's responses to past events and the client's insights of what actions are needed to respond to the event; based on one or more of the plurality of client preferences, means for customizing the response center, the customized response center initially placed in a standby mode, the standby mode indicating that the client is not currently responding to an event; upon receiving client input through the graphical user interface, means for activating the customized response center when an event has occurred; providing a notification to the stakeholder when the customized response center is activated by the client; means for automatically re-populating the menu of the graphical user interface of the activated response center with suggested actions for the client to perform in response to the event, the suggested actions selected from least one of the best practices template of the stakeholder and the client's preferences; means for capturing a first set of data based on activities that occur in the activated response center related to the client's actions taken in response to the event; generating a first set of analytics based on the captured first set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of a single client tenant; means for capturing a second set of data based on activities that occur in a plurality of response centers s of client tenants related to the clients' actions taken in response to the events that occurred to them; generating a second set of analytics based on the captured second set of data, the analytics based on one or more of dates, time stamps and metadata of the captured data of the plurality of client tenants; and based on the first and second set of analytics produced by the response system, means for generating and transmitting an updated menu of suggested actions for responding to a future event, to one or more of the clients.
Other example embodiments of the disclosure and aspects will become apparent from the following description taken in conjunction with the following drawings.
Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings.
The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with exemplary embodiments. These exemplary embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
Traditionally, to their detriment, businesses respond very slowly to events that may pose a threat to those businesses. A non-limiting list of such events include cyber breaches, cyber threats, data breaches, ransomware, security breaches, loss of data, catastrophic events (such as a plane crash, a fire, a shipwreck, an earthquake, a tornado, or a flooding), any insurable event, cyber intrusions, natural disasters, healthcare response, lawsuits from employees/shareholders, regulatory investigations, supply chain disruptions, pandemics, food safety, product recall, crisis management, any other type of damage, destruction or disruption to a business and any other atypical event to which a business must respond. In some embodiments of the present disclosure, an event may be any incident outside the normal operations of a company where the company has to respond using a combination of internal stakeholders and external service providers and/or third parties, in a timely fashion, effectively and efficiently.
One of the principal reasons why businesses respond so slowly to such events is that businesses typically do not have a response plan to respond to these events in place. Instead, a typical business is unprepared to respond to any type of event and when it is presented with an event, the business itself and its people act in an ad-hoc manner, with information being shared in a disorganized fashion via a flurry of documents, emails and phone calls which typically are not logged in any manner. Once an event is discovered, this information must be shared within the business or organization, meaning human resources people, general counsel, lawyers, and management teams, IT, Security, Legal, Management, Business Units, Board, Finance, Supply Chain, Risk Management, PR, Marketing, Customer Management/Support, Sales, etc. must be contacted. The business may also contact their secondary stakeholders, such as their Outside Legal Counsel, Consulting Firms, Crisis Management firms, Suppliers, Customers, Insurance Companies, Banks, Regulators, Governments, heir risk advisors, their consulting firms, etc. to inform them of the event. Unfortunately, the typical business fails to coordinate in their response to the event, with their internal people and their external stakeholders (including but not limited to forensics, e-discovery firms, and call center).
Furthermore, a business may respond to an event in a problematic manner which can open itself to even further issues, such as litigation issues or a public relations nightmare. For instance, a CEO of the company may cause even more problems by providing factually inaccurate quotes in a press release about the event, which may haunt the company in later litigation proceedings. Again, the inability to properly respond to an event is largely due to the lack of a response plan in place.
To provide a business with a response plan, a system for providing response control and analytics is provided. This system helps to reduce liability and the business (client) has a response plan that is always “on” and continually being updated. With this response plan in place, a client can rest assured that they have a plan that provides an instant, automated response to an event, with the best resources and tools in place, as well as ways for the client to benchmark themselves on how they responded to an event and how they can improve on their responses to events in the future. The stakeholder typically helps to set up its clients' response centers because (1) events may never happen to some of the stakeholder's clients and (2) the clients typically do not have the expertise or knowledge on how to populate their own response centers.
In some exemplary embodiments of the present disclosure, a system for providing response control and analytics is implemented using a cloud service provider with a serverless architecture that relies upon multitenancy. At a high level, the multi-tenancy system provisions any number of tenant and various types of tenants. For instance, as will be described later herein in greater detail in relation to
In some embodiments, the system is provided by an organization (stakeholder) to the organization experiencing the event (client). Furthermore, for purposes of dealing with the event there may be other organizations (service providers) that also have access to the system. Finally, a third party, which may be invited typically by a client to view, edit or otherwise access the data of a client, may be provisioned by the system as a third party tenant. The exemplary system is a platform that is customizable and configurable on at least two levels. First the platform is customizable because it can implement a stakeholder's best practices template. The stakeholder can provide and codify information about their best practices in the form of a best practices template by industry, geography, revenue band, and the like. The best practices template may provide the stakeholder's answers to such questions, who needs to be involved, who has what responsibilities, what are the facts to be gathered, what will impact likelihood, what actions or tasks need to be done, etc. Also, the best practices template might also include a pre-defined list of service providers pre-negotiated or known to the stakeholder. Thus, the stakeholder's client does not have the burden of trying to find to these service providers when an event has happened.
Second, the platform is customizable because a client tenant can edit, modify, add or make any other configuration changes to its response center based on their own preferences. Preferably, the system comprises a single version of the platform for all end users. All of the system's end users may obtain updates in lockstep releases through code or through AB testing. AB testing is the opposite of lockstep. In AB testing, a subset A of clients obtain one update while another subset B of clients receive another update. Then the stakeholder can see which subset does better in order to judge the efficacy of the two updates.
The system relies upon the cloud-based environment and the multitenancy architecture to ensure that each client tenant has a customized response plan which can be depicted as a response center through graphical user interfaces (GUIs) as shown on a client's computing device. A response center may be viewed as a secure, centralized environment for a client tenant in which the response to an event can be collaborated on, shared, acted upon, monitored and analyzed by internal and external parties, including third parties and stakeholders. Furthermore, each client's response plan is always “on,” in a standby mode waiting for an indication that an event has occurred. Once an event has occurred, the client can activate their response center via the GUIs as one of the first steps towards responding to the event at hand. Also, each client tenant is secure and separate from third parties and stakeholders. Furthermore, each client tenant with their response plan in place is also secure and separate from the rest of the client data, client server(s), client email servers and computerized workspace. Thus, if a data breach occurs on a client server or the client's mail server is down, the client can rest assured that their response center (which is provided by this serverless, cloud-based multitenancy system) has not been breached and remains safe and secure apart from the compromised client server.
The network 110 may include the Internet or any other network capable of communicating data between devices. Suitable networks may include or interface with any one or more of, for instance, a local intranet, a Personal Area Network, a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network (MAN), a Virtual Private Network (VPN), a storage area network, a frame relay connection, an Advanced Intelligent Network connection, a synchronous optical network connection, a digital T1, T3, E1 or E3 line, Digital Data Service connection, Digital Subscriber Line connection, an Ethernet connection, an Integrated Services Digital Network (ISDN) line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode connection, or an Fiber Distributed Data Interface or Copper Distributed Data Interface connection. Furthermore, communications may also include links to any of a variety of wireless networks, including Wireless Application Protocol, General Packet Radio Service, Global System for Mobile Communication, Code Division Multiple Access or Time Division Multiple Access, cellular phone networks, Global Positioning System (GPS), cellular digital packet data, Research in Motion, Limited duplex paging network, Bluetooth radio, or an IEEE 802.11-based radio frequency network. The network 110 can further include or interface with any one or more of an RS-232 serial connection, an IEEE-1394 (Firewire) connection, a Fiber Channel connection, an infrared port, a Small Computer Systems Interface connection, a Universal Serial Bus (USB) connection or other wired or wireless, digital or analog interface or connection, mesh, or Digi® networking. The network 110 may include a network of data processing nodes that are interconnected for the purpose of data communication. The network may include a Software-defined Networking (SDN). The SDN may include one or more of the above network types. Generally, the network 110 may include a number of similar or dissimilar devices connected together by a transport medium enabling communication between the devices by using a predefined protocol. Those skilled in the art will recognize that the present disclosure may be practiced within a variety of network configuration environments and on a variety of computing devices.
As mentioned earlier, in some exemplary embodiments, the system for providing response control and analytics (namely the response system 200) relies upon the benefits of a cloud network 110 and multitenancy to provision any number and types of tenants. The response system 200 may be a platform for one or more external stakeholders (such as insurers) to provide response centers to their clients. Although
Still referencing to
The response system leverages the use of the service provider 120 (such as a cloud service provider with a data center), for the service provider's managed services. In general, the service provider 120 comprises a processor 122, a memory 126 for storing data 130 which may be shared with the response system, a secure access provider and tokenizer 124 and a communications interface 128. The processor 122 will help to control data traffic and process data as requested by the response system 200. The processor will receive and transmit data with the response system 200 through the cloud network 110. The secure access provider and tokenizer 124 of the service provider 120 will verify the identity of stakeholders, clients and third parties who request access to the response system 200. The secure access provider and tokenizer 124 will generate and transmit security tokens to the response system 200 when identification is verified of a given party, such that data can be transmitted in encrypted form via the cloud network to the receiving party. The communications interface 128 allows for the service provider to communicate with any of the components within the environment 100, but primarily the service provider will communicate with the response system 200. The network 110 can include any of the network(s) disclosed infra.
The processor 210 can utilize the stakeholder's best practice template to construct and generate a response center via the response center generator 220. For instance, a response center provided by the response center generator 220 for a client can be viewed on a client's computing device. Typically, the response center is displayed on one or more graphical user interfaces, and the response center can comprise information regarding one or more events and the stakeholder's best practices template.
The processor 210 can also receive a plurality of client preferences, which may include changes, modifications, additions or configurations of the client's response center. Again, with the help of the response center generator 220, the processor can implement the plurality of client preferences, thereby updating the client's response center.
The processor 210 further receives a client input through a graphical user interface of the client's response center, where the client input activates a dormant response center when an event has occurred. A response center is usually dormant or on standby, waiting for an event to occur. Once the processor 210 receives this information that a client's response center is active, it provides and transmits a notification, via the cloud network, to a stakeholder of the client that the client's response center is now active.
The processor 210 may comprise, or may be in communication with, media (for example, computer-readable media) that stores instructions that, when executed by the processor 210, cause the processor 210 to perform the elements described herein. Furthermore, the processor 210 may operate any operating system capable of supporting locally executed applications, cloud-based applications, and/or browser or browser-enabled applications.
The database 230 may be configured to store one or more best practices templates from one or more stakeholders, as well as client preferences from a plurality of clients of the one or more stakeholders regarding their individual response centers. The database 230 may also be configured to store the identity verification results provided by the service provider, after the service provider has verified the identity of a system user, whether they be a third party, a client or a stakeholder.
The database 230 also stores analytics which are generated by the analytics component 240 (which will be discussed in greater detail later herein). The analytics component 240 can determine analytics based on key metrics. Those key metrics include but are not limited to, the time stamps, the dates and the loggings of any action, task, communication, data collection, and the like taken using the response center. The analytics component 240 may determine a first set of analytics based on a client's execution of tasks in response to a particular event. This first set of analytics may be based, in part, on the data stored on the client's local database in their response center and reports therefrom. The analytics component 240 may also determine a second set of analytics based on a plurality of clients' execution of tasks in response to one or more events. For example, if a stakeholder wants to determine how much time it took for its five clients to respond to an earthquake event, then the analytics component 240 can provide this information in a set of analytics. Based on the first and second sets of analytics provided by the analytics component 240, the response center may be updated by the response center generator 220. Finally, the analytics component 240 can provide a third set of analytics based on a global database comprising a corpus of event response reports furnished by related businesses.
Returning to the details of the exemplary response system, once the system platform is established with the stakeholder, the stakeholder's client can provide information to request access to the platform. The platform customizes the response center for the client based on the stakeholder's best practices template and the client's preferences or customization of its response center. Each client is secure and separate. The system can service multiple clients and multiple stakeholders.
The system platform can be implemented in a variety of ways or modes. For instance, in some embodiments, the response system is “always on” which could mean one of three things. A first possibility is that dedicated computer resources can be implemented in the response system such that they are “always on” and belong to a selected client X. A second possibility is that pooled compute resources are “always on” in that those pooled compute resources handle the client requests. A third and final possibility is that ephemeral computer resources can spin up or activate to service a single request. That is, tenant provisioning can happen completely “on the fly.”
In further embodiments, the system platform can be implemented such that it can be activated (“up and running”) within a short period of time, such as a day or two days. In such embodiments, this activation within a short period of time could mean one of two things. A first possibility is that the tenant provisioning performed by the response system is done manually or in a semi-automated way. A second possibility is that there is likely some dedicated compute, API paths and/or persistence resources that are designated for the client.
In yet further embodiments, the system platform can be implemented such that it can be activated (“up and running”) within minutes, which could mean that either tenant provisioning is automated or certain computer resources and/or persistence resources are created or provisioned for a tenant.
Three further architectural embodiments of a response system are provided in accordance with the present disclosure. In some embodiments, for instance, the response system can be architecturally organized such that a separate database is provided for each tenant in a silo fashion. In other embodiments, the response system can be architecturally organized in a bridge fashion such that a single database is used to store data for multiple tenants having multiple schemas. Finally, in further embodiments, the response system can be architecturally organized in a pooled fashion such that multiple tenants have their information stored in a shared database using a single schema.
The fact that the response system can be architecturally organized in a variety of ways can also be helpful in encryption of data. For instance, in the pooled model architecture, one can utilized shared encryption where a single database table is encrypted using a shared master key. Also, using the pooled model, encryption per tenant can be accomplished, such that the shared single database can be encrypted using a master key and rows can be encrypted utilizing a given tenant's key. In other words, each tenant has its own encryption key.
Furthermore, in the silo model, one can accomplish encryption per tenant such that there is a database table for each tenant, and each table is encrypted using its own key. Also, an optional additional layer of row encryption can be applied on one or more of the tenants' database tables, which in turn minimizes the possibility of an administrator view attack vector.
In some embodiments, methodologies of encryption hierarchy can be utilized in the response system. In a non-limiting example, all data in transit in the response system can be transported over HTTPS and TLS, while the data at rest can be encrypted using (a) a shared key for all tenants, (b) a key dedicated for each tenant (key per tenant) or (c) a shared key for all tenant plus a key per tenant.
As described above, the response system utilizes a cloud-based multi-tenancy architecture in order to provide response control and analytics to various parties, such as stakeholders, clients and third parties. The response system provides roles and access controls based on the identity of an entity or party. For instance, the response system can assign a persona or a role to a tenant of a stakeholder, a client or a third party, which allows the system to toggle or enable modules based on those personas or roles.
In some embodiments, the stakeholder will send a request for the response system to provision a client tenant with some basic information about the client (such as contact information, phone number, etc.). Upon receipt of that request, the response system will provision the client tenant. The client tenant will include a response center which may be considered as a digital centralized secure “war” room where a client such as an organization or a business is provided tools and resources to respond to an event. The stakeholder will provide the response system with its current best practices template which will be utilized by the response system to configure the initial response center for the client. From time to time the stakeholder may update their current best practices template, which is transmitted to the response system such that the response system can update the response centers assigned to the clients of the stakeholder.
A stakeholder's client can request through the stakeholder for access to its response center and upon verification by a service provider (such as service provider 120 in
From time to time, the client may update their client preferences. For instance, the client may receive analytics and feedback from its internal team and/or from the response system based on their handling of the past events. Those client preferences are transmitted to the response system and stored in the database of the response system, which then updates the response center in accordance with the client preferences. In other words, in some embodiments, the response center undergoes two layers of configuration (first, based on the current stakeholder's best practices template and second, based on the client's current preferences, analytics and feedback).
Because the stakeholder provided the initial request for their client to have access to a response center, the response system knows the source of the client and can associate or relate the stakeholder and the client, such that changes to the client or the client's response center will be provided to the stakeholder if needed. Also, changes to the stakeholder's best practices template will be automatically implemented to the client's response center, because again the response system has associated the stakeholder with the client and knows of that relationship.
Thus, for any event for which a client has activated their response center, the response system will notify the stakeholder through the stakeholder's dashboard of their application that the client's response center is now active. If the stakeholder is an insurer and if requested by an insurer, an insurance claim form will be automatically generated or a claim loss interface will appear, upon activation of a client's response center. Because there is a link or association between the client and the stakeholder, any metrics, such as cost, time, progress, and the like, can be captured as the client's team is assembled and actions are taken in response to the event, as reflected in the response center. Any activity happening in the response center can be emitted from the client tenant to the stakeholder tenant by the response system. Metrics can be processed such that the analytics platform of the response system can generate analytics based on such metrics. The analytics can be aggregated across a plurality of stakeholders or potentially the stakeholder will receive only those analytics that are based on the metrics from their own client base.
As with most multi-tenancy systems, the response system is structured such that users cannot cross tenancy boundaries. In other words, in some embodiments, a stakeholder is not accessing data straight from the client tenant, but rather the stakeholder is accessing data in their own tenant. In other embodiments, a stakeholder may also access data in a client tenant when a system user that is owned by the stakeholder tenant is granted access by the client tenant. This way the tenant boundary is not crossed by any one single user and all the data does not have to be duplicated. The response system provides access control to the tenants based on their identity and the permissions that were granted to the tenant. Thus, for instance, if a third party is a user of a client tenant and is invited to the client's response center, then the response system emits events from the tenant to the third party module, which can generate invites and notifying user. The third party tenant on their GUI dashboard can view all the client response centers to which they have been invited.
For authentication, the response system can authenticate users, authorize users and grant access through user identity and authentication. With the help of the service provider and the cloud network, the response system can obtain verification of user identity via multi-factor authentication, and the response system can include its own security policies. In further embodiments, for authentication in order to access the response system, an authorization token can be embedded in a secured link.
Once a user's identity is verified, preferably by the service provider, the response system generates secure access tokens that are associated with security policies that allow users to view and/or edit information that they have been granted access via permissions.
It should be noted that the response system uses a managed identity service for verification of a user's identity A user has a single source of identity on the system platform. Third parties have one login across all tenants, and thus a third party also has a single identity. Access tokens are created based on the user's identity. Role based security policies are applied. Entities are secured by role-based security. When a user requests to perform operations (read/write/delete) role-based access control verifies that the user has been granted permission for the operation. Permission can be revoked by the client at any time While a user has a single source of identity access tokens are managed per tenant. This means that a single access token cannot access data from multiple tenants. Access tokens for a session are exchanged by an authorization component of the response system, when a third party accesses rooms in different tenants to create a seamless user experience, while still maintaining data isolation and maintaining tenant boundaries.
It also should be noted that for encryption purposes, data files that are stored by the response system are given a unique identifier, such that one would have to access two systems in order to breach and gain access to that data file stored in the response system. In other words, when a user uploads a file in the application, two operations occur. First, the file content is read, encrypted and sent to a data storage bucket to a service provider, such as Amazon, where it is given a unique id. The upload operation then returns that ID and adds an entry into the database that associates that unique ID with the user and original file name. From a practical standpoint what this means is that an uploaded file is obfuscated or hidden behind a unique ID where the only access to that ID is via the system database, which has its own security and encryption. The data from the uploaded file is not stored in a way that would be easy for an attacker to gain access.
The analytics component can also provide analytics which compare time periods, such as Q1 of this year versus Q1 of last year, analytics in the form of trend lines, standard bench marking metrics, and the like. Actions, which are events that occur on entities, are emitted from the response center and as those events are emitted, they have metadata which contain information about the stakeholder and the like. The analytics component 240 of the response system 200 obtains and processes these events and metadata. If the stakeholder is opted into pooled analytics, these events can be placed as part of a pool. Otherwise the events can be associated with a single stakeholder. Based on these events the system can recommend/suggest changes to best practice templates (e.g., Target Time to Complete). Events can be generated by the system automatically such as during a state change or some can be entered manually. Events from the analytics system can also feedback into the client rooms—e.g. 70th percentile of time to complete an action and the like. Furthermore, the system can learn common third party suppliers involved in rooms and issue suggestions. The system can leverage machine learning, such as anomaly detection to flag outliers in the room set (cost of action, incomplete action, number of people, groups involved etc.). The system can leverage machine learning (i.e. anomaly detection) to flag response centers that are potentially not prepared for a breach or an event.
If a client clicks on a graphical user interface of their response center, all the activity and data connection are being logged. Therefore, the system can answer many questions based on analytics. For instance, the system can answer such questions as: How long was it before a breach or event was identified, the call team was contacted and the client's response center was activated by the client? What was the average time between the responses from the team or updates from the team on a classification? This information can be shown in the execution tab as depicted in
Also, as a client is responding to an event, the client may wish to view analytics provided by the analytics component that may be helpful to the client. For instance, predictive analytics may be furnished to the client which provides feedback to the user in real time. Also, aggregated anonymized analytics may be provided to the client. For instance, the analytics component may inform the client that across European retailers in the client's industry, it took approximately three weeks to complete a given stage of the response plan. Some of the analytics may be fine-grained, while other analytics are inline. Inline analytics occurs when the analytic is delivered right next to where the operation is performed. For instance, if there is a discussion amongst people on how to manage task X, imagine there is a slider or graph that shows how long task X is taking, but also how long it has taken everyone else. Thus, the analytic of how well a client is doing compared to their peers is delivered inline—right next to where the operation is actually taking place. The alternative to inline analytics is offline analytics where a task is performed in one place and all the analytics are collected in a separate place. Thus, a client must view a separate analytics page or application to obtain the analytics. Analytics may include two levels of data, namely, system data and anonymized user data.
In a non-limiting example of a use case, in accordance with certain embodiments of the present disclosure, the response system can provide valuable feedback, metrics and analytics to one or both of the client and the stakeholder. The system can analyze a current stale of a client's response center and issue a preparedness score. This preparedness score is a numerical representation of how prepared the client is to respond to an event or a given event type. The response system can analyze the amount of time it took for the client to complete one or more actions in response to an event. Then the system can show or provide data of where the client falls in relation to the stakeholder's other clients or the client's peers within the system or SDA based on regulation. For instance, the system can determine how much time it took for the client to notify a regulator that an event occurred. The system can also determine how much time it took for the client to notify the individuals affected by the event or the public at large.
Then, based on the event type, the system can prioritize two or more actions that are designed to mitigate the risk in response to the event. For instance, if the event type is a data breach, the system is likely to prioritize the changing of passwords within a given number of hours and indicate to the client through its response center that the action to change passwords is a top priority for the client to act upon as part of the client's response to the data breach event.
In further embodiments, based on historical data for actions that are generated by the system and/or by a user, the response system can heuristically learn or determine what are the typical actions that performed during a response to an event, such a breach response, and based on such information, the system can suggest those actions and/or suggest amendments to the best practices templates of the stakeholder and/or the client.
In other embodiments, based on learning of real world events that occur or based on analysis of data reports, news items, external third party resources, and the like, the response system can issue training events with similar characteristics, thereby allowing clients to practice how they respond to an event. The client's actions and timings of their response to an event can then be compared with the real event data to see if the client reacted well, or whether the client's preparedness for a given event needs improvement.
In yet further embodiments, if a certain type of event occurs, the response system can provide valuable information to a client, such as providing contact information of providers or third parties entities that are recommended by the system and/or the stakeholder's best practices template. Thus, for instance, if flooding happens to a banking company in a branch office, the response system may provide the recommended list of flood specialists in the area that can quickly assist in mitigating the flood damage. Also, the response system through a wizard can analyze the profile of a company and show or provide real world events that have happened to related companies. In some embodiments, the response system can provide this information through the news feed of a client's response center, which is described later herein.
When the user selects the SETUP tab 1810, two GUI panels may appear which include an Overview panel 1880 and a Groups panel 1890. The overview panel 1880 provides an overview or quick summary regarding the event at hand. The event as shown in exemplary
The Groups panel 1890 provides an overview of the various groups associated with the client business or organization that was affected by the event. The groups may be external to the client business (such as a call center or a group of lawyers) or internal (department employees in Finance or eDiscovery and the like). The Groups panel 1890 provides the location, designated responsibilities, the owners and the contributors of each group. A team member of the client business can add or remove a group by clicking the appropriate buttons 1892 and 1894, respectively.
Referring to
The example computer system 3100 includes a processor or multiple processors 3102, a hard disk drive 3104, a main memory 3106, and a static memory 3108, which communicate with each other via a bus 3110. The computer system 3100 may also include a network interface device 3112. The hard disk drive 3104 may include a computer-readable medium 3120, which stores one or more sets of instructions 3122 embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 3122 can also reside, completely or at least partially, within the main memory 3106, the static memory 3108, and/or within the processors 3102 during execution thereof by the computer system 3100. The main memory 3106 and the processors 3102 also constitute machine-readable media.
While the computer-readable medium 3120 is shown in an exemplary embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media. Such media can also include, without limitation, hard disks, floppy disks, NAND or NOR flash memory, digital video disks (DVDs), Random Access Memory (RAM), Read-Only Memory (ROM), and the like.
The exemplary embodiments described herein can be implemented in an operating environment comprising computer-executable instructions (e.g., software) installed on a computer, in hardware, or in a combination of software and hardware. The computer-executable instructions can be written in a computer programming language or can be embodied in firmware logic. If written in a programming language conforming to a recognized standard, such instructions can be executed on a variety of hardware platforms and for interfaces to a variety of operating systems.
In some embodiments, the computer system 3100 may be implemented as a cloud-based computing environment, such as a virtual machine operating within a computing cloud. In other embodiments, the computer system 3100 may itself include a cloud-based computing environment, where the functionalities of the computer system 3100 are executed in a distributed fashion. Thus, the computer system 3100, when configured as a computing cloud, may include pluralities of computing devices in various forms, as will be described in greater detail below.
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors (such as within web servers) and/or that combines the storage capacity of a large grouping of computer memories or storage devices. Systems that provide cloud-based resources may be utilized exclusively by their owners, or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud may be formed, for example, by a network of web servers that comprise a plurality of computing devices, such as a client device, with each server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depends on the type of business associated with the user.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire, and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, DVD, any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a FlashEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
Computer program code for carrying out operations for aspects of the present technology may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a LAN or a WAN, or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The corresponding structures, materials, acts, and equivalents of all means or steps plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the disclosure. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.
Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
Thus, computer-implemented methods and systems for response control and analytics are described. Although embodiments have been described with reference to specific exemplary embodiments, it will be evident that various modifications and changes can be made to these exemplary embodiments without departing from the broader spirit and scope of the present application. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
Parthasarathi, Arvind, Avala, Sai, Gaffney, Kevin, Buffini, Darragh
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10182045, | Jan 29 2016 | GE DIGITAL HOLDINGS LLC | Method, system, and program storage device for managing tenants in an industrial internet of things |
10234853, | Dec 31 2015 | GE DIGITAL HOLDINGS LLC | Systems and methods for managing industrial assets |
10467029, | Feb 21 2017 | Amazon Technologies, Inc.; Amazon Technologies, Inc | Predictive graphical user interfaces |
10483003, | Aug 12 2013 | CERNER INNOVATION, INC | Dynamically determining risk of clinical condition |
10698926, | Apr 20 2017 | Microsoft Technology Licensing, LLC | Clustering and labeling streamed data |
10708135, | Jan 31 2019 | EMC IP HOLDING COMPANY LLC | Unified and automated installation, deployment, configuration, and management of software-defined storage assets |
10797964, | Nov 26 2016 | Amazon Technologies, Inc | System event notification service |
10810361, | Feb 09 2020 | Bhaskar Mannargudi, Venkatraman; Pravin Sai, Chunduru; Sivarama Subramaniam, Raju | Role-agnostic interaction management and real time workflow sequence generation from a live document |
10990488, | Dec 12 2019 | Dell Products L.P. | System and method for reducing failover times in a redundant management module configuration |
11188857, | Jun 30 2016 | Amazon Technologies, Inc | Automating functions in a computing environment |
11354430, | Sep 16 2021 | Cygnvs Inc. | Systems and methods for dynamically establishing and managing tenancy using templates |
6188407, | Mar 04 1998 | GE MEDICAL SYSTEMS INFORMATION TECHNOLOGIES, INC | Reconfigurable user interface for modular patient monitor |
8151323, | Apr 12 2006 | Citrix Systems, Inc | Systems and methods for providing levels of access and action control via an SSL VPN appliance |
8832268, | Aug 16 2012 | Amazon Technologies, Inc | Notification and resolution of infrastructure issues |
8874741, | Nov 25 2009 | T-Mobile USA, Inc.; T-Mobile USA, Inc | Secured remote management of a home network |
9240996, | Mar 28 2013 | EMC Corporation | Method and system for risk-adaptive access control of an application action |
9858559, | Jan 28 2009 | Headwater Research LLC | Network service plan design |
9953007, | Nov 23 2010 | International Business Machines Corporation | Template-based content creation |
9990134, | Jun 15 2016 | Seagate Technology LLC | Command tunneling in a hybrid data storage device |
20080086363, | |||
20090307166, | |||
20100088636, | |||
20100169860, | |||
20110010349, | |||
20110173679, | |||
20120158821, | |||
20130191531, | |||
20140089039, | |||
20140278755, | |||
20150112700, | |||
20150120359, | |||
20150134733, | |||
20150154643, | |||
20150163206, | |||
20150172321, | |||
20150281453, | |||
20150310188, | |||
20150324400, | |||
20160294854, | |||
20160335260, | |||
20160378450, | |||
20160378728, | |||
20170006135, | |||
20170041296, | |||
20170099181, | |||
20170124502, | |||
20170132721, | |||
20170149630, | |||
20170169699, | |||
20170195265, | |||
20170255455, | |||
20170262142, | |||
20170282014, | |||
20180027006, | |||
20180144314, | |||
20180152358, | |||
20180165386, | |||
20180181716, | |||
20180321820, | |||
20180365278, | |||
20190034047, | |||
20190065177, | |||
20190095241, | |||
20190102440, | |||
20190163814, | |||
20190325373, | |||
20190339821, | |||
20200034764, | |||
20200067789, | |||
20200097920, | |||
20200104401, | |||
20200104402, | |||
20200151836, | |||
20200160458, | |||
20200162917, | |||
20200202271, | |||
20200210647, | |||
20200218432, | |||
20200233685, | |||
20200234218, | |||
20200342520, | |||
20200344185, | |||
20200349173, | |||
20210120043, | |||
20210160018, | |||
20210216381, | |||
20210275899, | |||
20210409218, | |||
20220027828, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 27 2020 | Cygnvs Inc. | (assignment on the face of the patent) | / | |||
Jul 27 2020 | AVALA, SAI | CYGNVS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 053376 | /0735 | |
Jul 27 2020 | BUFFINI, DARRAGH | CYGNVS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 053376 | /0735 | |
Jul 27 2020 | GAFFNEY, KEVIN | CYGNVS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 053376 | /0735 | |
Jul 27 2020 | PARTHASARATHI, ARVIND | CYGNVS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 053376 | /0735 |
Date | Maintenance Fee Events |
Jul 27 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Aug 03 2020 | SMAL: Entity status set to Small. |
Date | Maintenance Schedule |
Dec 13 2025 | 4 years fee payment window open |
Jun 13 2026 | 6 months grace period start (w surcharge) |
Dec 13 2026 | patent expiry (for year 4) |
Dec 13 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 13 2029 | 8 years fee payment window open |
Jun 13 2030 | 6 months grace period start (w surcharge) |
Dec 13 2030 | patent expiry (for year 8) |
Dec 13 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 13 2033 | 12 years fee payment window open |
Jun 13 2034 | 6 months grace period start (w surcharge) |
Dec 13 2034 | patent expiry (for year 12) |
Dec 13 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |